The Rapid7 Blog:
Your Signal in the Security Noise

Insights, stories, and guidance from our global security and research teams.

Weekly security updates — no spam. Privacy Policy.

Metasploit Wrap-Up 10/4/19

Exposure Management

Metasploit Wrap-Up 10/4/19

Dean Welch's avatar

Dean Welch

This One Time on a Pen Test: “Let Me Get That for You”

Exposure Management

This One Time on a Pen Test: “Let Me Get That for You”

Trevor O'Donnal's avatar

Trevor O'Donnal

SAML All the Things! A Deep Dive into SAML SSO

Rapid7 Blog

SAML All the Things! A Deep Dive into SAML SSO

Elijah A. Martin-Merrill's avatar

Elijah A. Martin-Merrill

Open-Source Command and Control of the DOUBLEPULSAR Implant

Products and Tools

Open-Source Command and Control of the DOUBLEPULSAR Implant

William Vu's avatar

William Vu

Exim Vulnerability (CVE-2019-16928): Global Exposure Details and Remediation Advice

Products and Tools

Exim Vulnerability (CVE-2019-16928): Global Exposure Details and Remediation Advice

Kwan Lin's avatar

Kwan Lin

How DHS and MITRE Collaborate to Validate Vulns

Products and Tools

How DHS and MITRE Collaborate to Validate Vulns

Bri Hand's avatar

Bri Hand

DAST vs. SAST: Which solution is better?

Products and Tools

DAST vs. SAST: Which solution is better?

Vivian Ma's avatar

Vivian Ma

Metasploit Wrap-Up 9/27/19

Products and Tools

Metasploit Wrap-Up 9/27/19

Shelby Pace's avatar

Shelby Pace

This One Time on a Pen Test: Our Accidental Win

Threat Research

This One Time on a Pen Test: Our Accidental Win

Ted Raffle's avatar

Ted Raffle

Four Ways to Improve Automated Vulnerability Management Efficiency with SOAR

Products and Tools

Four Ways to Improve Automated Vulnerability Management Efficiency with SOAR

Tori Sitcawich's avatar

Tori Sitcawich

How to Easily Schedule a Meeting with Rapid7 Support

Security Operations

How to Easily Schedule a Meeting with Rapid7 Support

Rapid7's avatar

Rapid7

Metasploit Wrap-Up 9/20/19

Products and Tools

Metasploit Wrap-Up 9/20/19

Matthew Kienow's avatar

Matthew Kienow

This One Time on a Pen Test: What’s in the Box?

Threat Research

This One Time on a Pen Test: What’s in the Box?

Ted Raffle's avatar

Ted Raffle

Strategies to Secure Cloud Environments

Products and Tools

Strategies to Secure Cloud Environments

Aaron Sawitsky's avatar

Aaron Sawitsky

How to Drive Cybersecurity Transformation in Healthcare

Industry Trends

How to Drive Cybersecurity Transformation in Healthcare

Bri Hand's avatar

Bri Hand

Metasploit Wrap-Up: Sep. 13, 2019

Products and Tools

Metasploit Wrap-Up: Sep. 13, 2019

Brendan Watters's avatar

Brendan Watters

This One Time on a Pen Test: The Pizza of Doom

Exposure Management

This One Time on a Pen Test: The Pizza of Doom

Jonathan Stines's avatar

Jonathan Stines

Automating User Provisioning and Deprovisioning with Security Orchestration, Automation, and Response (SOAR)

Products and Tools

Automating User Provisioning and Deprovisioning with Security Orchestration, Automation, and Response (SOAR)

Christie Ott's avatar

Christie Ott

CVE-2019-15846 Privileged Remote Code Execution Vulnerability in the Exim Mailer: What You Need to Know

Products and Tools

CVE-2019-15846 Privileged Remote Code Execution Vulnerability in the Exim Mailer: What You Need to Know

boB Rudis's avatar

boB Rudis

R7-2019-09 | CVE-2019-5617, CVE-2019-5643, CVE-2019-5644: C4G BLIS authentication and authorization vulnerabilities (FIXED)

Vulnerabilities and Exploits

R7-2019-09 | CVE-2019-5617, CVE-2019-5643, CVE-2019-5644: C4G BLIS authentication and authorization vulnerabilities (FIXED)

Sam Huckins's avatar

Sam Huckins

Metasploit Wrap-Up 9/6/19

Exposure Management

Metasploit Wrap-Up 9/6/19

Sonny Gonzalez's avatar

Sonny Gonzalez